KT-ORAM: An Efficient ORAM Built on k-ary Tree of PIR Nodes

نویسندگان

  • Jinsheng Zhang
  • Qiumao Ma
  • Wensheng Zhang
  • Daji Qiao
چکیده

This paper proposes KT-ORAM, a new hybrid ORAM-PIR construction, to protect a client’s access pattern to outsourced data. KT-ORAM organizes the server storage as a k-ary tree with each node acting as a fully-functional PIR storage, and adopts a novel delayed eviction technique to optimize the eviction process. KT-ORAM is proved to protect the data access pattern privacy at a failure probability negligible in N (N is the number of exported data blocks), when system parameter k = logN . Under the same configuration, KT-ORAM has an asymptotical communication cost of O( logN log logN · B) when the recursion level on meta data is of O(1) depth, which can be achieved if block size B = N ε (0 < ε < 1), or O( log 2 N log logN · B) when the number of recursion levels is O(logN). The costs of KT-ORAM are compared with those of several state-of-the-art ORAMs. The results show that, KT-ORAM achieves the best communication, storage and client-side computational efficiency simultaneously, at the price of requiring O( log 2 N log logN · B) computational cost at the storage server for each data query.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MSKT-ORAM: Multi-server K-ary Tree Oblivious RAM without Homomorphic Encryption

This paper proposes MSKT-ORAM, an efficient multiple server ORAM construction, to protect a client’s access pattern to outsourced data. MSKT-ORAM organizes each of the server storage as a k-ary tree and adopts XOR based PIR and a novel delayed eviction technique to optimize both the data query and data eviction process. MSKT-ORAM is proved to protect the data access pattern privacy at a failure...

متن کامل

TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption

This paper proposes TSKT-oblivious RAM (ORAM), an efficient multi-server ORAM construction, to protect a client’s access pattern to outsourced data. TSKT-ORAM organizes each of the server storages as a k-ary tree and adopts XOR-based private information retrieval (PIR) and a novel delayed eviction technique to optimize both the data query and data eviction process. TSKT-ORAM is proven to protec...

متن کامل

MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption

This paper proposes MSKT-ORAM, an efficient multiple server ORAM construction, to protect a client’s access pattern to outsourced data. MSKT-ORAM organizes each of the server storage as a k-ary tree and adopts XOR based PIR and a novel delayed eviction technique to optimize both the data query and data eviction process. MSKT-ORAM is proved to protect the data access pattern privacy at a failure...

متن کامل

Recursive Trees for Practical ORAM

We present a general construction to reduce the communication cost of recent tree-based ORAMs. Contrary to trees with constant height and path lengths, our new construction r-ORAM provides varying, shorter path lengths. Accessing an element in the ORAM tree will have different communication cost depending on the location of the element. The main idea behind r-ORAM is a recursive ORAM tree struc...

متن کامل

Efficient Private File Retrieval by Combining ORAM and PIR

Recent research results on tree-based Oblivious RAM by Shi et al. [15] obtain communication complexity of O(l · log(N)) in the worst-case for an N -capacity storage with blocks size l. The individual nodes in the tree, however, are constructed using traditional ORAMs which have worst-case communication complexity linear in their capacity and block size. PIR protocols are able to provide better ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015